Security Blogs

cancel
Showing results for 
Search instead for 
Did you mean: 
cancel

Cisco CyberSecurity

Blog Articles

Can Security Rules Make AI Generated Code Safer?

  Can Security Rules Make AI Generated Code Safer? What We Learned From 2,717 Prompts With Project CodeGuard AI coding assistants are now a part of everyday development. They scaffold new services,...

1 Comments

Cisco’s Recent Open Source AI Project Announcements

I am extremely proud that Cisco is leading the charge with a remarkable suite of open source AI projects. These initiatives aren’t just research experiments; they’re production-ready tools that addres...

1 Comments

Proxy ARP on Cisco FTD

Summary:Proxy ARP is enabled by default on all ASA/Firepower interfaces, but it generally comes into effect only when NAT is configured. Under normal circumstances, when traffic flows between a source...

3 Comments

Implementing IPSec (IKEv1) over DMVPN Phase-3 Tunnel

                                                                         Implementing IPsec over DMVPN  Phase-3 Tunnels Introduction Lab Topology IPsec Configuration Verification Conclusion Introducti...

1 Comments

DMVPN Phase 3 Implementation

                                                                                            DMVPN Phase 3 Implementation Introduction Lab topology Phase 3 Tunnel Configuration Routing Protocol (Eigrp)...

1 Comments

Red Teaming for AI Security

Building AI is one thing; securing it is another. While constructing powerful AI systems, the real challenge lies in anticipating how they might be attacked or exploited. That’s where AI red teaming s...

3 Comments

DMVPN Phase-2 Implementation

                                                                             DMVPN Phase-2 Implementation Introduction Overlay Configuration Routing Protocol Configuraton Verification Conclusion   Int...

1 Comments

Site-to-Site IPSec VPN with Overlapping Subnets

                                                                       Site-to-Site IPSec VPN  with Overlapping Subnets Introduction The Problem The Solution Lab Example Introduction To configure a si...

1 Comments

Understanding Internet Key Exchange Protocol (IKE)

                                                              Understanding Internet Key Exchange (IKE) Protocol IKE Operation Main Mode Vs Aggressive Mode IKE Phase-1 IKE Phase-2 Conclusion IKE Opera...

1 Comments

A New Identity Framework for AI Agents

We are all experiencing the rapid proliferation of autonomous AI agents and Multi-Agent Systems (MAS). These are no longer AI chatbots and assistants; they are increasingly self-directed entities capa...

1 Comments

AI Model Context Protocol (MCP) and Security

The Model Context Protocol (MCP) is an open standard that provides a universal way to connect AI models and agentic applications to various data sources and tools. It's how AI applications and applica...

2 Comments

Idling timeout

How do you extend the idling timeout screen? 

0 Comments

Multi-Factor Authentication with Cisco Duo Security

                                                        Cisco Duo SecurityDuo Security was a company acquired by Cisco that develops a very popular multifactor authentication solution that is used by ...

0 Comments
Getting Started

Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: